Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 6 Feb 2015 10:27:19 +0800
From: Marina Glancy <marina@...dle.com>
To: cve-assign@...re.org
Cc: Kurt Seifried <kseifried@...hat.com>, oss-security@...ts.openwall.com, 
	security <security@...dle.com>
Subject: Re: CVE request for Moodlee MDL-48980 Security: Always clean the
 result from min_get_slash_argument - Moodle

Hello,
We already had CVE for this issue: CVE-2015-0246, which one do you want us
to publish? Or both?
Sincerely,
Marina Glancy
Development Process Manager, Moodle HQ

On Fri, Feb 6, 2015 at 12:59 AM, <cve-assign@...re.org> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> >
> http://git.moodle.org/gw?p=moodle.git;a=commit;h=af9a7937cc085f96bdbc4724cadec6eeae0242fc
> >
> > MDL-48980 Security: Always clean the result from min_get_slash_argument
>
> Use CVE-2015-1493.
>
> - --
> CVE assignment team, MITRE CVE Numbering Authority
> M/S M300
> 202 Burlington Road, Bedford, MA 01730 USA
> [ PGP key available through http://cve.mitre.org/cve/request_id.html ]
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.14 (SunOS)
>
> iQEcBAEBAgAGBQJU06ESAAoJEKllVAevmvmsUnoH/2YfDh5GcUTl/+QiOeH2Drj9
> 81MUmmh7BEQEJ6lV5oFgnwTw+QBSkzgGwtTyYyOTc0BD0sDYIoS3IuiDJD7/tPtr
> /wAMaPss8k+G20V+2IbeG9bJSx1vf9ZIhh1nV8lahsVEH9VFq1895y6/epOOKVmR
> spX1LYl/JgoXveOGuyu1xZmNLxNtJhCBR5+CKMF3GUPsv7PvU4uO1h00Gwz0UkVL
> KZPiZCyfPHzodypx9cwCiQFLzNWwi1SCIGXmAHIH55W14mfhX/BB4Q1qNyvPOUEs
> z2XEYrXkbJtJRuQz/AJJiYiYd7PLkWlfdYiVatvwNGNiWP8CPpzmCzVIy5iLvoA=
> =CZWg
> -----END PGP SIGNATURE-----
>

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ